The increasing proliferation of Information and communication technologies (ICT) in our lives, has facilitated the connectivity growth between distinct parts of our world. Various types of data are continuously streaming across many boundaries in the world with different models, policies, and purposes. Additionally, this data is usually analyzed or stored on edge or gateways devices which have highly limited capabilities and are vulnerable to sophisticated attacks. With the growth of connectivity between various heterogeneous systems, numerous attack vectors are constantly evolving, that can potentially be exploited for malicious or criminal purposes (e.g. data breaches, identity theft, and stealing of intellectual property and trade secrets, etc.). Recent cyberattacks dangerously aim a broad array of computing systems varying from data centers and personal machines to mobile devices and industrial control systems.

There is a growing need for new methodologies, tools, and techniques, capable of extracting, preserving, and analyzing different evidence trails in various networked services and devices such as routers, firewalls, web proxies, and network monitoring tools. Additionally, there is also a growing need for research in new systems capable of analyzing network traffic, netflows, and systems logs. Satisfying these demands will aid in reconstructing the timeline of the cyber-crime/attack under investigation and, possibly, the identification of the potential actor(s).

The evolve of networked technologies, such as the internet of things and cyber-physical systems, possess challenges base on the highly limited capabilities of their infrastructure devices and the type of data that can be processed by these devices. Complicated efforts are required in suitable and timely manners against any detected threats. Moreover, new frameworks are required to collect and preserve potential evidential data in suitable and timely manners as well. To guarantee proper cyber-defenses and strategies against the expanding landscape of criminal activities as well as rapidly advancing network technologies such as SDN or 5G and 6G.

The main motivation for this Workshop is to bring together researchers and practitioners working on cyber forensics and threat investigations for emerging networks to disseminate current research issues and advances. Original technical papers describing new, state-of-the-art research, will be considered. The Workshop welcomes submissions that evaluate existing research results by reproducing experiments. The aim of this workshop is to provide insight for the discussion of the major research challenges and achievements on various topics of interest.

CFATI 2020 will be held in conjunction with the 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2020) which is co-organized on November 2-5, 2020, Madeira, Portugal.

Scope of The Workshop: ​

Papers on practical as well as on theoretical topics and problems in various topics related to cyber forensics and threat investigations are invited, with special emphasis on novel techniques and tools to collect data from networked devices and services in emerging networks (such as the ones can be found in cyber-physical systems and Internet of things). Topics include (but are not limited to):

The submission processes will be managed by easychair.org. If you have used this system before, you can use the same username and password. If this is your first time using EasyChair, you will need to register for an account by clicking “I have no EasyChair account” button. Upon completion of registration, you will get a notification email from the system and you are ready for submitting your paper. You can upload and re-upload the paper to the system.

Publication

All CFATI 2020 accepted papers will be published by Elsevier Science in the open-access Procedia Computer Science series on-line. Procedia Computer Science is hosted by Elsevier and on Elsevier content platform ScienceDirect, and will be freely available worldwide. All papers in Procedia will be indexed by Scopus and by Thomson Reuters' Conference Proceeding Citation Index . All papers in Procedia will also be indexed by Scopus and Engineering Village (Ei). This includes EI Compendex. Moreover, all accepted papers will be indexed in DBLP . The papers will contain linked references, XML versions, and citable DOI numbers. You will be able to provide a hyperlink to all delegates and direct your conference website visitors to your proceedings.

Selected papers presented at the workshop, after further revision, will have the opportunity to be published in special issues in indexed and/or high impact factor journals (details will be put online shortly).